videodrome

joined 2 years ago
MODERATOR OF
 

We’re kicking things off in the new year with a returning guest, Mr. Bil Herd. He was the principal engineer on the Commodore Plus/4, C16/116, C264, C364, and the Commodore 128. Come join us at our usual location, the Alderwood United Church, 44 Delma Dr., Etobicoke ON, M8W 4N6, Canada.

The meeting takes place on Thursday, January 11, 2024 at 7:30PM ET. If you’re unable to attend in person, please join us online via the Zoom link below. Thanks for attending!

Join Zoom Meeting https://us02web.zoom.us/j/88059151457?pwd=RTEzUWM5bnc4cFpjVjZBYXNEMElEZz09

Meeting ID: 880 5915 1457 Passcode: 274933

https://blog.phylum.io/rust-malware-staged-on-crates-io/ is a better article with details.

ty for article recommendation ... much better!

slackware was my first distro as well, I think I still have the book and cd for it in a box somewhere.

[–] videodrome@lemmy.capebreton.social 2 points 2 years ago (2 children)

Shorter than the traditional program

. In this instance, no law, regulation, executive order or government contract required or permitted SpaceX to engage in the widespread discrimination against asylees or refugees that the department’s investigation found, as explained in the complaint.

Amass
The OWASP Amass project performs network mapping of attack surfaces and external asset discovery using open-source information gathering and active reconnaissance techniques.

Osmedeus
Osmedeus is a workflow engine for offensive security that allows you to build and run a reconnaissance system on a wide range of targets, including domains, URLs, CIDRs, and GitHub repositories. It was designed to establish a strong foundation and can adapt and function automatically to perform reconnaissance tasks.

PhoneInfoga
PhoneInfoga is an advanced tool to scan international phone numbers. It allows you to gather basic information such as country, area, carrier, and line type, then use various techniques to find the VoIP provider or identify the owner. It works with a collection of scanners that must be configured for the tool to be effective.

Sherlock
Sherlock allows you to search social media accounts by username across social networks.

Shodan
Shodan is a search engine for Internet-connected devices. Discover how internet intelligence can help you make better decisions. The entire Shodan platform (crawling, IP lookups, searching, and data streaming) is available to developers. Use their API to understand whether users connect from a VPN, whether the website you’re visiting has been compromised, and more.

Social Analyzer
Social Analyzer is an API, CLI, and web app for analyzing and finding a person’s profile across social media and websites. It includes different analysis and detection modules; you can choose which modules to use during the investigation process. The analysis and public extracted information from this OSINT tool could help investigate profiles related to suspicious or malicious activities such as cyberbullying, cyber grooming, cyberstalking, and spreading misinformation.

SpiderFoot
SpiderFoot is an OSINT automation tool. It integrates with just about every data source available and utilizes a range of methods for data analysis, making that data easy to navigate. SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be used completely via the command-line.

theHarvester
theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red team assessment or penetration test. It performs OSINT gathering to help determine a domain’s external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using multiple public resources.

The method "tricks the victim into thinking their device's Airplane Mode works when in reality the attacker (following successful device exploit) has planted an artificial Airplane Mode which edits the UI to display Airplane Mode icon and cuts internet connection to all apps except the attacker application," Jamf Threat Labs researchers Hu Ke and Nir Avraham said in a report shared with The Hacker News.

The approach devised by Jamf, in a nutshell, provides an illusion to the user that the Airplane Mode is on while allowing a malicious actor to stealthily maintain a cellular network connection for a rogue application.

Currently using a version of hal higdon half marathon plan.

I followed c25k & bridge to 10k before I moved onto the hal higdon.

Great story!

Love reading all the nostalgia these historical tidbits inevitably bring up

That is an excellent interview ... Thanks for sharing.

That certainly adds to the whole problem with payouts.

I sadly missed those days :(

[–] videodrome@lemmy.capebreton.social 2 points 2 years ago (2 children)

Good point about the cyber-insurance aspect of things perpetuating the problem.

I don't have hard data but I believe this will be a thing of the past soon enough. With ransomware being so common an issue now & the requirements to obtain said insurance getting harder to meet, I could see that not being a viable or cost-effective solution to restoring service.

view more: ‹ prev next ›